Protection against reverse engineering in ARM

@article{Yehuda2019ProtectionAR,
  title={Protection against reverse engineering in ARM},
  author={Raz Ben Yehuda and N. Zaidenberg},
  journal={International Journal of Information Security},
  year={2019},
  volume={19},
  pages={39-51}
}
  • Raz Ben Yehuda, N. Zaidenberg
  • Published 2019
  • Computer Science
  • International Journal of Information Security
  • With the advent of the mobile industry, we face new security challenges. ARM architecture is deployed in most mobile phones, homeland security, IoT, autonomous cars and other industries, providing a hypervisor API (via virtualization extension technology). To research the applicability of this virtualization technology for security in this platform is an interesting endeavor. The hypervisor API is an addition available for some ARMv7-a and is available with any ARMv8-a processor. Some ARM… CONTINUE READING
    4 Citations
    From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone
    • PDF
    The hyplet - Joining a Program and a Nanovisor for real-time and Performance
    • Raz Ben Yehuda, N. Zaidenberg
    • Computer Science
    • 2020 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS)
    • 2020

    References

    SHOWING 1-10 OF 51 REFERENCES
    TrustZone Explained: Architectural Features and Use Cases
    • 34
    • PDF
    C-FLAT: Control-Flow Attestation for Embedded Systems Software
    • 132
    • PDF
    HA-VMSI: A Lightweight Virtual Machine Isolation Approach with Commodity Hardware for ARM
    • 5
    KVM/ARM: the design and implementation of the linux ARM hypervisor
    • 164
    • PDF
    An Efficient Kernel Introspection System using a Secure Timer on TrustZone
    • 3
    Truly-Protect: An Efficient VM-Based Software Protection
    • 16
    • PDF
    Software security aspects of Java-based mobile phones
    • 11
    • PDF
    Hypervisor-Based Protection of Code
    • 4
    • PDF
    VOT4CS: A Virtualization Obfuscation Tool for C#
    • 10
    • PDF